A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

被引:0
|
作者
Zhu, Lijuan [1 ]
机构
[1] Shanghai JianQiao Coll, Dept Informat Technol, Shanghai, Peoples R China
来源
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4 | 2013年 / 241-244卷
关键词
Fingerprint; Probabilistic Encryption of RSA; Identity Authentication Protocol;
D O I
10.4028/www.scientific.net/AMM.241-244.2471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user's fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.
引用
收藏
页码:2471 / 2474
页数:4
相关论文
共 50 条
  • [31] A robust embedded biometric authentication system based on fingerprint and chaotic encryption
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Abundiz-Perez, F.
    Lopez-Gutierrez, R. M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 8198 - 8211
  • [32] An identity authentication protocol for acknowledgment in IEEE 802.15.4 network
    Heo, J
    Hong, CS
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2005, 3779 : 355 - 358
  • [33] Efficient identity-based hierarchical access authentication protocol for mobile network
    Liu, He
    Liang, Mangui
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1509 - 1521
  • [34] A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption
    Yao H.
    Wang C.
    Xu Q.
    Li W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2375 - 2383
  • [35] Improved chaos-RSA-based hybrid cryptosystem for image encryption and authentication
    Gafsi, Mohamed
    Amdouni, Rim
    Hajjaji, Mohamed Ali
    Malek, Jihene
    Mtibaa, Abdellatif
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [36] Network Authentication Based on Secret Key Encryption
    Hu, Xiangyi
    Zhao, Guifen
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 51 - 55
  • [37] Network Authentication Protocol Based on McroPayment Protocol
    Shen Qunli
    Lv Jiong
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5949 - 5953
  • [38] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    ChineseJournalofElectronics, 2014, 23 (04) : 842 - 850
  • [39] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [40] Identity authentication system based on fingerprint identification and pulse certification
    Xu, Qian
    Deng, Jie
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 280 - 284